Configuration system and methods including configuration inheritance and revisioning

a configuration system and configuration technology, applied in the field of computer network management, can solve the problems of difficult, if not impossible, for a network security administrator to know, monitor and change configurations in view of security threats, and ensure that the policy is properly implemented at all times on the network, and achieve the effect of effective configuration

Active Publication Date: 2008-06-03
SYMANTEC CORP
View PDF24 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0019]Still yet another method includes generating an effective configuration for a managed product from a configuration inheritance chain. The generating an effective configuration includes getting a mark-up language string for a most-derived configuration object. The generating an effective configuration further includes converting the mark-up language string for the most-derived configuration object to a derived tree structure having nodes. A plurality of nodes in the derived tree structure includes collision detection names.
[0020]The generating an effective configuration also includes getting a mark-up languag

Problems solved by technology

Unfortunately, it is difficult, if not impossible, for a network security administrator to know the configuration of each product, each device, at the various tiers that exist on the network at a given moment in time.
Consequently, monitoring and changing configurations in view of a security threat is a time consuming and difficult task.
While there may be a well-defined security policy, assuring the policy is properly implemented at all times on the network is difficult.
Consequently, it is unclear what must be done to implement the security policy.
This problem is exacerbated because there

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration system and methods including configuration inheritance and revisioning
  • Configuration system and methods including configuration inheritance and revisioning
  • Configuration system and methods including configuration inheritance and revisioning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072]A system 100 (FIG. 1) includes a security management system 150 for a plurality of managed products 110_1 to 110—nk. Security management system 150 stores configuration data for managed products 110_1 to 110—nk in a directory 116. Configuration data is stored in directory 116 in the form of configuration objects 118 and setting objects 117, in one embodiment. In one embodiment, the operational parameters are included in one or more setting objects that are addressed by a configuration object, e.g., the configuration object includes pointers to the setting objects.

[0073]Configuration objects may be assigned to an entity in computers 119B, an entity in users 119A, or an entity in configuration groups 119C. As explained more completely below, each of a computer, a user, and a configuration group may be assigned one configuration object for a software feature of a managed product.

[0074]Inheritance between configuration objects 118 is supported. This allows an administrator to crea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system includes a security management system for a plurality of managed products. The security management system stores configuration data for managed products and managed nodes in a directory. Configuration data is stored in the directory in the form of configuration objects and setting objects. A revision history of a configuration object and/or a setting object can be maintained. Inheritance between configuration objects is supported so that a configuration inheritance chain is available. To determine an effective configuration at a point in time, a parent-child inheritance merge process is used. To assist the parent-child inheritance process, name attributes and collision resolution mode attributes are used.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates generally to managing applications on a computer network, and more particularly to managing applications on a computer network using configuration inheritance and revisioning.[0003]2. Description of Related Art[0004]Multi-vendor security services and products typically provide network security. Each security service and product typically must be configured and reconfigured to maintain network security. Typically, each vendor for a security service and product utilizes various settings to establish a configuration. Some of these settings may be established at the time a product is installed. A user, a group, or update features of the product may establish other settings.[0005]Unfortunately, it is difficult, if not impossible, for a network security administrator to know the configuration of each product, each device, at the various tiers that exist on the network at a given moment in time. C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/44G06F9/45
CPCG06F8/71G06F9/44536
Inventor AGBABIAN, PAUL M.HERTEL, DAVID R.
Owner SYMANTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products